MIS140 Final Exam MC study set

¡Supera tus tareas y exámenes ahora con Quizwiz!

A backbone network that connects many backbone networks spanning serveral buildings at a single location is often called a Internet backbone? (T/F)

False

A hardware device that operates at the application layer is a router (T/F)

False

Backbone networks typicaly use lower speed circuits to interconnect a series of LANs and provide connections to other backbone networks (T/F)

False

Routers can only connect the same type of cable (T/F)

False

Routers operate at the application layer (T/F)

False

The cable to connect BNs is usually twisted pair. (T/F)

False

One basic component of a backbone network is the hardware device that connects other networks to the backbone. (T/F)

True

Routers connect tow or more network segments that use the same or different data link protocols, but the same network protocol (T/F)

True

Routers use network layer address to forward packets between network segments. (T/F)

True

Switches and routers are devices that can connect networks to the BN (T/F)

True

The data rate for a T-1 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps

1.544 Mbps

OC-3072 has a data rate of a. 159.25 Gbps b. 39.813 Gbps c. 1.544 Mbps d. 100 Mbps e. 1.244 Gbps

159.25 Gbps

In North America, a T1 circuit has ______ 64Kbps channels. a. 2 b. 30 c. 24 d. 12 e. 36

24

The data rate for a T-3 circuit in North America is: 1.544 Mbps 6.312 Mbps 44.376 Mbps 274.176 Mbps 1.544 Gbps

44.376

The backbone architecture layer that is closest to the users is the A. access layer B. Distribution layer C. Core layer D. Privacy Layer E. Switched layer

Access layer

Which of the following is not true about multiswitch VLANs? a. Several switches are used to build a VLAN b. The switches in the VLAN can send packets among themselves in a way that identifies the VLAN to which the packet belongs. c. In some multi-switch VLANs, the Ethernet packet is modified based on the emerging IEEE 802.1q standard. d. In some multi-switch VLANs, a new VLAN packet encapsulates the Ethernet packet. e. All of the above are true statements.

All of the above are true statements

The _________________ is a Canadian government agency that regulates voice and data communication. a. PSTN b. FCC c. CRTC d. CSU e. POTS

CRTC

A ___________ is/are devices that permit a user to connect to a digital T-carrier service. a. modem b. codec c. CSU/DSU d. NIC e. ATM

CSU/DSU

____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs. a. Common carriers b. Router manufacturers c. Standards organizations d. CSUs e. PUCs

Common Carriers

The ___ is the part of the backbone that connects the different backbones together. a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer

Core later

______________ are sometimes called private line services. a. WANs b. LANs c. Circuit-switched networks d. Dedicated-circuit networks e. Routed-backbone networks

Dedicated-circuit networks

Which of the follwing is not a type of intruder who attempts to gain intrusion to computer networks? a. script kiddies b.delphi team members c. crackers d. professional hackers e. organization employees

Delphi team member

__________ provide authentication which can legally prove who sent a message over a network. a. Digital signatures b. DES keys c. Directory keys d. Screen names e. User Ids

Digital signatures

The ____ is the part of the backbone that connects the LANs together A. access layer B. Distribution layer C. Core layer D. Privacy Layer E. Switched layer

Distribution layer

VLANs prioritize traffic based on the _____ a.) IEEE 802.1q standard b.) IEEE 802.11 standard c.) VLAN size d.) multiswitch allocation e.) switch dynamics

IEEE 802.1q standard

_____________ is a common standard for use by layer 2 access VPNs for encapsulation. L2TP VPN2 Encapsule2 TCP/IP PPP

L2TP

__________ is a term that refers to the speed in converting input packets to output packets. a. Transfer mode b. Latency c. Burstiness d. Cell relay e. Frame relay

Latency

Most IP services use _______ as the data link layer protocol. Ethernet TCP MPLS IRoute T1

MPLS

_____________ is sometimes called a Layer 2.5 technology. a. ATM b. MPLS c. Ethernet d. TCP e. IP

MPLS

A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network. a. ANI system b. NAT firewall c. IP spoofing bridge d. packet level firewall e. smart hub

NAT firewall

__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network. Translation Conversion Network address translation Proxy translation IP conversion.

Network address translation

With IP services, the ________ at the sending site takes the outgoing message (which usually is an Ethernet frame containing an IP packet), strips off the Ethernet frame and uses the IP address in the IP packet to route the packet though the carrier's packet‐switched network to its final destination. PAD gateway switch router WAN

PAD

computers can be assigned to a VLAN based on the _____ a.) IEEE 802.1q standard b.) NIC interface c.) physical port on the switch d.) IEEE 802.3 standard e.) physical location of the computer

Physical port on the switch

Using___ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to reserve sufficient network capacity so that they will always be able to send and receive voice messages. a.) backbone b.) switched c.) routed d.) QoS e.) access

QoS

A subnetted or hierarchical backbone can also be called: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone

Routed backbone

_________ move packets along the backbone based on their network layer address. 1. Bridged backbones 2. Hubbed backbones 3. Multistation access unit backbones 4. Routed backbones 5. NIC backbones

Routed backbones

Which of the following is not considered one of the five most common business impacts? a. Financial b. Productivity c. Reputation d. Social e. Safety

Social

A __________ type of BN has a star topology with one device, such as a switch, at its center. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Switched backbone e. Routed backbone

Switched backbone

_________ have no backbone cable. a. Switched backbones b. Cloud routed backbones 3. Hubbed backbones 4. Bridged backbones 5. Multistation access unit backbones

Switched backbones

Which of the following is not a type of VPN? intranet VPN extranet VPN access VPN T-1 VPN a VPN that enables employees to access an organization's network from a remote location

T-1 VPN

_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today. a. Wideband analog services b. SMDS c. ATM d. T-carrier services e. ISDN

T-carrier services

Which of the following is not a benefit of packet switched services? a. The data transmission rates tend to be lower than dial-up or dedicated circuits. b. You don't have to set up dedicated circuits between each end point from and to which you wish to transmit data and/or voice. c. You have the flexibility to send data through a temporary circuit between two connections that will be disconnected as soon as the digital transmission is completed. d. All circuits are less susceptible to a great deal of noise because they are digital. e. You don't have to specify all the interconnecting services you need for your WAN when you buy the service.

The data transmission rates tend to be lower than dial-up or dedicated circuits.

Which of the following is not true about Layer-3 switches? a. They switch messages based on their IP address. b. They can be used in place of routers. c. They function faster than routers. d. They have more simultaneously active ports than routers. e. They can only switch messages based on their data link layer addresses.

They can be used in place of routers.

Which of the following is true regarding switched backbones? a. They place all network devices for one part of the building physically in the same room, often in a rack of equipment b. They have an advantage of requiring less cable c. They make it more difficult to move computers from one LAN to another d. Network capacity is always tied to the physical location of the computers e. They are harder to maintain and upgrade than a BN that is not rack-based

They place all network devices for one part of the building physically in the same room, often in a rack of equipment

Which of the following is not true about backbone networks? a. They may also be called enterprise networks if they connect all networks within an organization. b. They typically connect many networks, including LANs. c. They typically provide connections to other BNs, WANs, MANs, and the Internet. d. They may also be called campus networks if they connect many BNs spanning several buildings as a single location. e. They tend to use lower speed circuits than LANs.

They tend to use lower speed circuits than LANS

_______________ describes how an asset can be compromised by one specific threat. a. Threat scenarios b. Threat plans c. Threat hacks d. Threat contingencies e. Threat attacks

Threat scenarios

_______________ is an encryption standard that uses a total of 168 bits as the key. a. Triple DES b. Dial-back c. WEP d. EAP e. Ciphering

Triple DES

Spyware, adware and DDOS agents are three types of: A. IP spoofing attacks B. Denial-of-service attacks C. Trojans D. Physical security threats E. Intrusion prevention detection approaches

Trojans

A backbone network is a high-speed network that connects many networks? T/F

True

A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN segments via software, rather than by hardware. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone Routed backbone

Virtual LAN

Which of the following is a fundamental backbone network architecture? a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Gatewayed backbone e. Virtual backbone

Virtual LAN

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. a. WLANs b. intranet c. extranet d. WAN e. none of the above

WLANs

a sniffer program is a: a. type of macro-virus b. small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location c. used in a call-back modem d. a program that records all LAN messages received for later (unauthorized) analysis e. secure hub program

a program that records all LAN messaged recieved for later (unauthorized) analysis

Which of the following would be least effective in improving backbone performance? a. improving the computers in the network b. changing the demand placed on the network c. adding new keyboards to the client computers d. upgrading the circuits between computers e. improving devices in the network

adding new keyboards to the client computers

A symmetric encryption system has two parts: the key and the ____________. a. algorithm b. spamming method c. IP spoofer d. clearance code e. smart card bits

algorithm

A fundamental technique to determine if an intrusion is in progress in a stable network is: anomaly detection armoring cable RSA algorithm patching scanning a user's fingerprint

anomaly detection

A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks. a. application level firewall b. bullion server c. ANI system d. IP spoofing systems e. packet level firewall

application level firewall

Ethernet/IP packet networks: are supported with gigabit fiber optic networks in large cities are offered only by the common carriers use token ring layer 2 media access control use IPX/SPX protocols provide CIR up to a maximum of 1.544 Mbps

are supported with gigabit fiber optic networks in large cities

A(n) _________ is something of value and can be either hardware or software. a. asset b. service level agreement c. threat d. security plan e. network design

asset

Threat of intrusion comes from ____________. a. the government b. crackers c. outside of the organization d. both inside and outside of the organization e. inside of the organization

both inside and outside of the organization

Which of the following is not a basic architecture for dedicated circuit networks? ring partial mesh bus star full mesh

bus

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. a. disaster recovery firm b. DES company c. directory company d. certificate authority e. fingerprint advisory board

certificate authority

In a packet switched network, permanent virtual circuits that look very similar to a ____ move packets through a network. a. cloud-based ring design b. cloak-based mesh design c. cloud-based mesh design d. common carrier ring design e. common carrier bus design

cloud-based mesh design

Which of the following would not be part of an "ideal" backbone design for the future? A. access layer composed of 10/100 layer 2 Ethernet switches B. distribution layer composed of layer 3 Ethernet switches of 100 (or 1000) Base-T C. redundant switches D. core layer composed of layer 3 Ethernet switches running 10 (or 40) GbE over fiber E. coax cabling throughout LANs and BN

coax cabling throughout LANs and BN

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: Trojan horse sniffing tunneling computer forensics misuse detection

computer forensics

A star architecture: a. connects all computers in a closed loop b. connects all computers off a backbone circuit c . connects all computers to one central computer that routes messages to the appropriate computer d. all of the above e. none of the above

connects all computers to one central computer that routes messages to the appropriate computer

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? a. disruption b. destruction c. controlled chaos d. intrusion e. disaster

controlled chaos

Developing _______ helps develop a secure network. a. rules b. controls c. network maps d. vendor documentation e. service level agreements

controls

________ controls fix a trespass into the network. a. corrective b. detective c. preventive d. mitigating e. backup

corrective

the biggest drawbacks to VLANs are their _____ a.) cost and management complexity b.) size and contention c.) contention and cost d.) learning curve and contention e.) speed and size

cost and management complexity

_________ controls stop a person from acting. a. detective b. corrective c. mitigating d. preventive e. backup

preventive

Which of the following is not a type of intrusion prevention system? a. network-based b. data link-based c. application-based d. host-based e. none of the above

data link-based

A _______ is a connectionless method of sending data packets on a packet switched service. a. bursty packet b. virtual circuit c. datagram d. histogram e. permanent virtual circuit

datagram

Which of the following is not a technology layer that is considered when designing backbone networks? access layer distribution layer decentralized layer core layer none of the options

decentralized layer

A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed. a. denial-of-service attack b. service level agreement c. virus d. spamming e. scamming

denial-of-service attack

A star topology is: a. difficult to manage because the central computer receives and routes all messages in the network b. dependent upon the capacity of the central computer for its performance c. always slower than a ring network d. less susceptible to traffic problems than other architectures e. not affected if the central computer fails

dependent upon the capacity of the central computer for its performance

An example of _____ of data would be if a computer virus eliminated files on that computer. a. disruption b. controlled chaos c. intrusion d. destruction e. disaster

destruction

A tornado that eliminates a network control center would be an example of a natural __________ a. disaster b. disruption c. controlled chaos d. destruction e. intrusion

disaster

Encryption is the process of: a. transmission of information over secure lines in analog form to prevent illegal access b. detecting errors in messages by means of mathematical rules c. correcting errors in message by means of mathematical rules d. disguising information by the use of mathematical rules, known as algorithms e. preventing errors in messages by means of logical rules

disguising information by the use of mathematical rules, known as algorithms

A network switch failure is an example of a(n) ________ threat. a. internal b. disruptive c. causal d. intrusion e. disaster

disruptive

Which of the following is not a type of hardware device that can be used to interconnect networks? a. layer 3 switches b. routers c. dumb terminals d. layer 2 switches e. all of the above can be used

dumb terminals

Network demand will not be reduced by: A. restricting (or moving) applications such as desktop videoconferencing B. using network devices to ensure that broadcast messages do not go to other networks C. encouraging the use of applications such as medical imaging D. sending status information to all computers on all LANs in the backbone network E. restricting (or moving) applications such as multimedia

encouraging the use of applications such as medical imaging

A way to prevent intrusion by disguising information through algorithms is: a. spoofing b. call-back access c. encryption d. disk elevatoring e. disk mirroring

encryption

To snare intruders, many organizations now use _________ techniques. entrapment hacker Trojan horse cracker DES

entrapment

Which of the following type of media is least susceptible to eavesdropping? a. fiber optics b. twisted pair c. microwave d. infrared e. coaxial cable

fiber optics

A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network. a. firewall b. token system c. ANI d. call-back modem e. firefighter

firewall

IP spoofing means to: a. fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network b. clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation c. illegally tape or listen in on telephone conversations d. detect and prevent denial-of-service attacks e. act as an intermediate host computer between the Internet and the rest of the organization's networks

fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network

In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. a. full mesh design b. ring design c. star design d. bus design e. partial mesh design

full mesh design

Circuit capacity on a backbone network will not be improved by: A. going from 100Base-T Ethernet to 10Base-T Ethernet B. going from 100Base-T Ethernet to gigabit Ethernet C. adding additional circuits alongside heavily used ones D. replacing a shared circuit backbone with a switched circuit backbone E. providing a faster circuit to the server

going from 100Base-T Ethernet to 10Base-T Ethernet

The use of hacking techniques to bring attention to a larger political or social goal is referred to as a. hacking b. ethical politics c. hacktivism d. social engineering e. brute force attacks

hacktivism

Dynamic routing: a. imposes an overhead cost by increasing network traffic b. decreases performance in networks which have many possible routes c. decreases performance in networks with "bursty" traffic d. should be used in 80 to 90 percent of total networks' capacity e. is another term for static routing in WANs

imposes an overhead cost by increasing network traffic

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has: a. decreased because the new sophisticated technology is far more secure than the old manual methods b. remained the same because management was always deeply interest in control and security c. decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society d. increased because this commitment to data communications has changed the potential vulnerability of the organization's assets e. remained the same because there are very few threats to data communications

increased because this commitment to data communications has changed the potential vulnerability of the organization's assets

A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat. a. disruptive b. controlled chaos c. disruptive d. intrusion e. disaster

intrusion

Often, incidents of ___________ involve employees of the organization, surprisingly enough. a. intrusion b. disruption c. controlled chaos d. destruction e. disaster

intrusion

DES: a. is maintained by ISO b. refers to Date Electronic Security c. is a commonly used symmetric encryption algorithm that was developed in the mid-1970s d. was developed by a joint effort that included Microsoft e. is an asymmetric algorithm

is a commonly used encryption algorithm that was developed in the mid-1970s

Primary rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 128Kbps e. is comprised of analog circuits only

is typically offered only to commercial customers

Switches: a. learn addresses by reading the source and destination addresses b. operate at the physical layer only c. connect two ore more network segments that use different data link protocols d. connect two or more network segments that use different network protocols e. have become more popular than layer 2 switches

learn addresses by reading the source and destination addresses

Which of the following is a primary advantage of a VPN? low cost inflexibility unpredictable traffic congestion security complexity to the user

low cost

Associated with a switched backbone, MDF is an acronym for: a. multi-station device foundation b. main distribution facility c. manual data frequency d. multiplexer downstream flow e. maximum data facility

main distribution facility

A security hole is a(n): A. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users small peep-hole in a door or wall to allow a B. security guard to examine an individual before allowing that individual access to a secure area or location C. packet-level firewall D. missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution E. ANI system

malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users

Routers: a. operate at the application layer b. operate only at the physical layer c. cannot connect two or more networks that use the same type of cable d. may also be called TCP/IP gateways e. operate only at the data link layer

may also be called TCP/IP gateways

In a ring design WAN, a. messages can take a long time to travel from the sender to the receiver b. a message arrives at all computers on the network simultaneously c. messages always arrive faster than in other types of layouts d. messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver e. messages always take one second to travel between sender and receiver

messages can take a long time to travel from the sender to the receiver

A(n) ____________, is an information system that is critical to the survival of an organization. a. network plan b. accounting system c. IDS d. mission critical application e. firewall

mission critical application

Which of the following is not a way to reduce network demand? a. shifting network usage from high cost times to lower cost times b. using data compression techniques for all data in the network c. requiring a network impact statement for all application software developed by the organization d. moving data further from the applications and people who use them e. shifting network usage from peak to lower demand times

moving data further from the applications and people who use them

According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they a. often have weaker security. b. have more assets. c. are more likely to have credit card numbers available. d. are likely off-shore. e. have lower bandwidth

often have weaker security

A _____________ is a user's connection into a packet switched service. a. packet analog/digital device b. packet asynchronous/discrete device c. packet asymmetric/data transmission device d. packet assembly/disassembly device e. packet analyzer/decoder device

packet assembly/disassembly device

A(n) ____________ examines the source and destination address of every network packet that passes through it. a. packet level firewall b. mullion server c. ANI system d. IP spoofing system e. application level firewall

packet level firewall

Which of the following type of networks permit packets from separate messages to be interleaved? circuit switched network dedicated circuit network dial up circuit network packet switched network Fractional T-1 network

packet switched network

Devices in a rack are connected together using ___ a.) patch cables b.) string c.) servers d.) modules e.) chassis switches

patch cables

Which of the following is not a method for deterring intrusion? a.training end users not to divulge passwords b. using a smart card in conjunction with a password to gain access to a computer system c.using biometric devices to gain access to a computer system d. using a security software package that logs out users if that user is 'idle' for a certain amount of time. e. performing social engineering

performing social engineering

A _________ is a connection-oriented approach to sending packets on a packet switched service. a. permanent virtual circuit b. datagram c. histogram d. bursty packet e. fractional T-1 network

permanent virtual circuit

Which of the following is not a key issue to be considered when selecting a WAN service? a. prestige value of using a particular common carrier b. flexibility c. capacity d. control e. reliability

prestige value of using a particular common carrier

________ controls discover unwanted events. a. preventive b. corrective c. detective d. mitigating e. backup

preventive

Basic rate interface: A. is typically offered only to commercial customers B. provides a communications circuit with two 64 Kbps B channels, plus one D channel C. is defined exactly the same way in Europe D. has an upper capacity of 1.544 Mbps E. is comprised of analog circuits only

provides a communications circuit with two 64 Kbps B channels, plus one D channel

Each state or Canadian province has its own ___________ to regulate communications within its borders. a. CRTC b. Federal Communications Commission c. common carriers d. public utilities commission e. PTT

public utilities commission

With a switched backbone network, the equipment is usually placed in a ___ a.) server b.) NIC c.) cabinet d.) basement e.) rack

rack

The key principle in preventing disruption, destruction and disaster is ___________. a. redundancy b. control spreadsheet c. IDS d. anti-virus software e. prevention controls

redundancy

Routers: a. require more management than switches b. are not susceptible to time delays 3. use data link layer addresses to move packets that leave the subnet 4. require only a few set of TCP/IP addresses 5. don't need much time to establish separate subnet addresses for each LAN

require more management than switches

Mesh networks: a. usually provide relatively long routes through the network (compared to ring networks) b. require more processing by each computer in the network than in star or ring networks c. do not use decentralized routing d. do not have much capacity wasted by network status information e. do not have many possible routes through the network to prevent one circuit from becoming overloaded

require more processing by each computer in the network than in star or ring networks

A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits. a. bus design b. star design c. full mesh design d. ring design e. partial mesh design

ring design

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. a. risk assessment b. backplane c. mitigating control factor analysis d. control verification worksheet e. control test plan

risk assessment

We can calculate the relative ___________, by multiplying the impact score by the likelihood. a. rootkit b. authentication c. risk score d. risk assessment e. risk event

risk score

A _____________ type of BN segments (each of which has a special set of subnet addresses that can be managed by different network managers) each part of the network connected to the backbone. a. bridged backbone b. virtual LAN c. hubbed backbone d. collapsed backbone e. routed backbone

routed backbone

Which of the following is not a way that a router differs from a switch? a. routers can connect two or more networks that use the same data link protocol b. routers only process messages that are specifically addressed to it c. routers operate at the network layer d. routers perform more processing on each message than switch e. routers can choose the "best" route between networks for forwarding a packet

routers perform more processing on each message than switch

For Ethernet networks, a _______ switch can make eavesdropping more difficult. a. secure b. Trojan horse c. proxy d. spoofing e. spamming

secure

IP Security Protocol: a. is focused on Web applications b. is primarily used to encrypt e-mail c. is a policy which makes public key encryption work on the Internet d. sits between IP at the network layer and TCP/UDP at the transport layer e. operates in entrapment mode

sits between IP at the network layer and TCP/UDP at the transport layer

A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits. a. ring design b. mesh design c. bus design d. star design e. mesh design

star design

Most backbone devices are store-and-forward devices. One simple way to improve performance is to ensure that they have ________________. a.) enough ports b.) sufficient memory c.) twisted pair connections d.) large wheels e.) IEEE 802.11

sufficient memory

Which of the following is not true about switched backbones? a. performance is improved over traditional (bridged or routed) backbone networks b. each connection into the switch is a separate point-to-point circuit which supports simultaneous access by the LANs connected to the switch c. there are many more networking devices in a switched backbone network d. if the switch fails, so does the entire backbone network e. the backbone essentially exists in the switch; there is no backbone cable

there are many more networking devices in a switched backbone network

Which of the following is not true about one-time passwords? a. Users' pagers can receive them. b. They can be used in conjunction with a token system. c. The user must enter the one-time password to gain access or the connection is terminated. d. This is a good security solution for users who travel frequently and who must have secure dial-in access. e. They create a packet level firewall on the system.

they create a packet level firewall on the system

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. asset service level agreement threat security plan network design

threat

Device performance on a backbone network will not be improved by: a. using the same protocols in the backbone and the LANs b. using static routing in low to moderate traffic conditions c. ensuring that backbone devices have sufficient memory so that packets do not have to be retransmitted by the sender d. translating packets from one protocol to another as they enter the BN none of the options

translating packets from one protocol to another as they enter the BN

A brute force attack against an encryption system: a. tries to gain access by trying every possible key b. is called RC4 c. is also known as 3DES d. always uses the Rijndael algorithm e. is part of the Advanced Encyrption Standard

tries to gain access by trying every possible key

Which of the following is a mode that is used by IPSec? a. exchange b. sniffer c. tunnel d. creeper e. firefighter

tunnel

With a virtual private network, users create permanent virtual circuits through the Internet called: bursts cells tunnels rings clouds

tunnels

A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. a. network cloaking device b. backup punch card reader c. uninterruptible power supply d. service level agreement e. help desk

uninterruptible power supply

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities? a. locks on network circuits after working hours b. passwords that disable the screen and keyboard of a computer c. secured network cabling behind walls and above ceilings d. use of armored cable e. unlocked wiring closet for network devices

unlocked wiring closet for network devices

The performance of WANs can be improved by: a. upgrading the circuits between the computers b. increasing the demand placed on the network c. downgrading the circuits between the computers d. downgrading the devices that provide access to the circuits e. increasing network traffic

upgrading the circuits between the computers

Switched backbone networks: a. always use a ring topology 2. are the least common type of BN used in one building 3. use a star topology with one device, usually a switch 4. have a great deal of cable in their backbones 5. tend to have less cable, but more network devices

use a star topology with one device, usually a switch

SONET: a. is a standard for optical transmission that currently operates at Terabit per second speeds b. is very similar to the ITU-T standard, synchronous digital hierarchy c. uses inverse multiplexing above the OC-1 level d. refers to Sprint Overall Network e. is not currently available, even in large cities

uses inverse multiplexing above the OC-1 level

A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. a. local carrier network b. virtual private network c. integrated service digital network d. software defined network e. SONET network

virtual private network

Which of the following are usually the first choice for eavesdropping? a. unshielded twisted pair b. shielded twisted pair c. local cables owned by the organization d. wireless LANs e. fiber optics

wireless LANs

A (n) ______ is a special type of virus that spreads itself without human intervention. snake worm Trojan horse boot sector virus stealth virus

worm


Conjuntos de estudio relacionados

Law of Contracts Study Questions

View Set

Management of Information Security Midterm

View Set

Chapter 3: Techniques, Safety, and Infection Control

View Set

ch 19- postoperative nursing management (med surg 1)

View Set

Macro - Macroeconomics at the Zero Lower Bound

View Set

Module 2- Section C: Globalization

View Set

FNAN 320: Exam 3 - Chapter PowerPoints

View Set